122 patents
Page 4 of 7
Utility
Aggregating alerts of malicious events for computer security
4 Jan 22
A method of processing malicious events in a network infrastructure determines features of malicious events detected by a firewall of an attack analyzer.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 5 Jun 18
Utility
Insider Threat Detection Utilizing User Group to Data Object And/or Resource Group Access Analysis
23 Dec 21
Techniques for detecting suspicious data object access requests indicative of potential insider threats are described.
Guy SHTAR, Shiri MARGEL
Filed: 8 Sep 21
Utility
Selective Database Logging with Smart Sampling
4 Nov 21
A method by a security analysis server to generate a traffic monitoring rule.
Ehud ESHET, Ophir BLEIBERG
Filed: 3 May 21
Utility
Procedural Code Generation for Challenge Code
28 Oct 21
A method by one or more computing devices for obfuscating challenge code.
Emil HERNVALL, Daniel SPÅNG
Filed: 30 Oct 20
Utility
Forced Identification with Automated Post Resubmission
28 Oct 21
A method by a web application layer proxy communicatively coupled between a client and an origin server for performing automated POST resubmission.
Daniel SPÅNG
Filed: 30 Oct 20
Utility
Columnar storage and processing of unstructured data
12 Oct 21
Data storage for unstructured data such as JSON data stored as collections of documents transforms the JSON data into a columnar form of storing unstructured data by grouping similar fields together for facilitating retrieval of the individual fields from a range of documents.
Ron Ben-Natan, Ury Segal
Filed: 13 Jun 14
Utility
Insider threat detection utilizing user group to data object and/or resource group access analysis
12 Oct 21
Techniques for detecting suspicious data object access requests indicative of potential insider threats are described.
Guy Shtar, Shiri Margel
Filed: 22 Jan 19
Utility
Enrichment of Database Logs
7 Oct 21
A method by a network device to enrich database logs.
Gabriel BEYO, Assaf COHEN, Eytan NAIM
Filed: 10 Dec 20
Utility
Detecting Behavioral Anomalies In User-data Access Logs
7 Oct 21
A method by one or more computing devices for detecting application user anomalies in audit logs of database operations performed on one or more databases.
Itsik MANTIN, Craig BURLINGAME, Brian ANDERSON, Kunal ANAND, Ran ROSIN, Peter KLIMEK, Joseph MOORE
Filed: 26 Apr 21
Utility
Data Leakage Prevention Over Application Programming Interface
30 Sep 21
A method by a network device for assigning data types to data values included in application programming interface (API) responses sent by an API server to one or more API clients via an API.
Itsik MANTIN, Avidan REICH
Filed: 30 Dec 20
Utility
Continuous Database Security and Compliance
12 Aug 21
A method by one or more electronic devices to notify an administrator when it is safe to mitigate a non-compliant database configuration of a database.
Avidan REICH, Amichai SHULMAN, Michael CHERNY
Filed: 31 Mar 21
Utility
Automatic generation of attribute values for rules of a web application layer attack detector
13 Jul 21
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server.
Tal Arieh Be'ery, Shelly Hershkovitz, Nitzan Niv, Amichai Shulman
Filed: 8 Aug 17
Utility
Predictive Activation of Security Rules to Protect Web Application Servers Against Web Application Layer Attacks
1 Jul 21
A method by a web application layer proxy for predictively activating security rules to protect one or more web application servers from attacks by one or more web application clients.
Itsik MANTIN, Ori OR-MEIR
Filed: 30 Dec 19
Utility
Privacy-preserving Learning of Web Traffic
1 Jul 21
A method by one or more network devices communicatively coupled to a web application layer proxy for profiling parameters of web application layer requests received by the web application layer proxy while preserving privacy.
Itsik MANTIN, Shelly HERSHKOVITZ, Amichai SHULMAN, Nitzan NIV
Filed: 30 Dec 19
Utility
Inline Anomaly Detection for Multi-request Operations
1 Jul 21
A method is described for a proxy to mitigate attacks from web application clients based on context of web application layer requests.
Jonathan R. AZARIA, Ori OR-MEIR, Nadav AVITAL, Amir SHLADOVSKY, Ben HERZBERG
Filed: 30 Dec 19
Utility
Passive Classification of Data In a Database Based on an Event Log Database
1 Jul 21
A method for passively classifying data in a database based on event logs stored in an event log database is described.
Or FRENKEL, Reut SHANI, Itsik MANTIN, Ran GERSON, Alexei OVSEITCHIK, Joseph C. G. BULLEN, Derrick J. HANCOCK, Chadwick R. THORNE
Filed: 30 Dec 19
Utility
Capturing Contextual Information for Data Accesses to Improve Data Security
1 Jul 21
A method by one or more runtime agents protecting a web application for capturing contextual information for data accesses.
Kunal ANAND, Brian ANDERSON, Joe MOORE, Ran ROSIN, Itsik MANTIN, Peter KLIMEK, Craig BURLINGAME
Filed: 30 Dec 19
Utility
Coordinated detection and differentiation of denial of service attacks
29 Jun 21
An analyzer module (AM) within a same protected network and on-premise with a server detects and distinguishes between types of Denial-of-Service (DoS) attacks.
Tal Arieh Be'ery, Amichai Shulman
Filed: 23 Jul 19
Utility
Packet Fingerprinting for Enhanced Distributed Denial of Service Protection
17 Jun 21
A method by one or more network devices implementing a scrubbing center for mitigating distributed denial of service attacks, where the scrubbing center is communicatively coupled to a plurality of clients and one or more servers.
Johnathan AZARIA, Avishay ZAWOZNIK
Filed: 17 Dec 19
Utility
Query usage based organization for very large databases
8 Jun 21
A query server identifies data collections of interest in a cloud store, and categorizes the collections based on an intended usage.
Ron Ben-Natan
Filed: 7 Mar 17